Skip To Main Content
Intel logo - Return to the home page

Sign In

Your username is missing
Your password is missing

By signing in, you agree to our Terms of Service.

Forgot your Intelusername orpassword?

Frequently Asked Questions

Do you work for Intel? Sign in here.

Don’t have an Intel account? Sign up here for a basic account.

My Tools

Select Your Region

Asia Pacific

  • Asia Pacific (English)
  • Australia (English)
  • India (English)
  • Indonesia (Bahasa Indonesia)
  • Japan (日本語)
  • Korea (한국어)
  • Mainland China (简体中文)
  • Taiwan (繁體中文)
  • Thailand (ไทย)
  • Vietnam (Tiếng Việt)

Europe

  • France (Français)
  • Germany (Deutsch)
  • Ireland (English)
  • Italy (Italiano)
  • Poland (Polski)
  • Spain (Español)
  • Turkey (Türkçe)
  • United Kingdom (English)

Latin America

  • Argentina (Español)
  • Brazil (Português)
  • Chile (Español)
  • Colombia (Español)
  • Latin America (Español)
  • Mexico (Español)
  • Peru (Español)

Middle East/Africa

  • Israel (עברית)

North America

  • United States (English)
  • Canada (English)
  • Canada (Français)
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Alder Lake
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.
  1. Intel Vulnerability Management Practices
Introducing 4th Gen Intel® Xeon® Scalable Processors Introducing 4th Gen Intel® Xeon® Scalable Processors
Introducing 4th Gen Intel® Xeon® Scalable Processors

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

 

 

 

 

 

 

Vulnerability Management

Sophisticated Systems to Address Security Vulnerabilities

Strong vulnerability management isn’t just a requirement in today’s complex security landscape. It’s the sign of mature incident response, indicating a company doesn’t just react to reported issues, it responds in measured ways, following industry-approved practices. 

We employ a wide range of vulnerability management and response tactics and work across the industry on mitigation development, validation, and disclosure of security vulnerabilities. You can trust we’re always looking for vulnerabilities. When we find them or they’re reported to us, we act with integrity and transparency.

Intel Product Security & Incident Response Team (PSIRT)

Intel’s PSIRT helped define and role models industry-approved methods for how we support product engineering in the identification, management, and disclosure of security vulnerabilities that may affect shipped and supported products. PSIRT is the central point for managing Intel’s response to product security vulnerabilities, including:

  • Setting policy, process, and tooling to ensure consistent handling, disposition and disclosure of product security vulnerabilities.
  • Advising Intel businesses and engineering groups on product security vulnerability handling.
  • Maintaining relationships with partner, customer and government agency PSIRTs and vulnerability handling organizations.
  • Creating and actively participating in industry groups and standards to help influence creation of best practices and standards. 

Intel’s PSIRT holds deep industry expertise, with team members averaging 18 years of experience.

Intel PSIRT Mission

Vulnerability Handling Processes

  

  

  

Intel Bug Bounty Program

Our PSIRT manages the Intel Bug Bounty Program. This program provides recognition to encourage external researchers to report security vulnerabilities on Intel products and collaborate on disclosure. Through the Bug Bounty program, Intel has worked with more than 250 external researchers since inception.

Learn more about the Bug Bounty program

  

  

Media/PR Inquiries

Have a question or would like to know more about our vulnerability management practices?

Click here

  

  

  

  

  

  

Industry Engagement

The Intel PSIRT is a strong supporter and member of industry groups. These engagements enable us to drive change for information and product security communities and accelerate security practices across industries.

Learn more

   

  

Product Security Center

Intel is focused on helping ensure the security of our customers’ computing environments by promptly addressing issues as they arise and providing recommendations through security advisories and security notices—these include mitigations or workarounds for vulnerabilities identified with Intel products.

The Intel Product Security Center is regularly updated with the latest security information on Intel products.

Visit the Intel Product Security Center

  

  

  

  

  

  

Software Security Guidance

Are you a software developer or system admin looking for resources to help you assess risk and build more secure solutions? We’ve designed a site for you. The Intel Developer Zone includes guidance on designing solutions with security in mind, including best practices for cryptography, software-based mitigations and affected processors by vulnerability for side channels.

Visit the site

  

  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Diversity & Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Do Not Share My Personal Information

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration and other factors. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding complicity in human rights abuses. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to a violation of an internationally recognized human right.

Intel Footer Logo